Anonymization and Privacy Services Infranet: Circumventing Web Censorship and Surveillance, Feamster et al, Usenix Security Symposium 2002.

Slides:



Advertisements
Similar presentations
Circumventing Web Censorship Nick Feamster. An Old Problem Many governments/companies trying to limit their citizens access to information –Censorship.
Advertisements

Tor: The Second-Generation Onion Router
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Presenting: Dafna Shahaf. Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan,
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Crowds: Anonymity for Web Transactions Paper by: Michael K. Reiter and Aviel D. Rubin, Presented by Eric M. Busse Portions excerpt from Crowds: Anonymity.
The Internet Useful Definitions and Concepts About the Internet.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Privacy on the Web Gertzman Lora Krakov Lena. Why privacy? Privacy is the number one consumer issue facing the internet. An eavesdropper (server, service.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Active Protocols for Agile Censor-Resistant Networks Robert Ricci Jay Lepreau University of Utah May 22, 2001.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Cryptography, Authentication and Digital Signatures
Network Security Essentials Chapter 5
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Anonymity – Crowds R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Lecture 14: Anonymity on the Web (cont) Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Network Security David Lazăr.
The Intranet.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
Chapter 14 Network Encryption
Web Services. 2 Internet Collection of physically interconnected computers. Messages decomposed into packets. Packets transmitted from source to destination.
Onion Routing R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1 Anonymous Communications CSE 5473: Network Security Lecture due to Prof. Dong Xuan Some material from Prof. Joan Feigenbaum.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Cryptography CSS 329 Lecture 13:SSL.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
The Intranet.
Internet and Intranet.
Network Security.
Secure Sockets Layer (SSL)
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Practical Censorship Evasion Leveraging Content Delivery Networks
Internet Networking recitation #12
Internet and Intranet.
Internet and Intranet.
Internet and Intranet.
Presentation transcript:

Anonymization and Privacy Services Infranet: Circumventing Web Censorship and Surveillance, Feamster et al, Usenix Security Symposium 2002.

Philosophy of Identity Privacy Standard uses of encryption can keep the contents of data private. Privacy concerning location/identity of users is usually ignored Inherently a difficult problem, since location and identity are usually core to routing and delivery.

Tools Anonymizer.com – analogous to anonymous r ing services. –Squid and Zero Knowledge are the same Triangle Boy – volunteer peer-to-peer solution. Peekabooty – sends encrypted requests to a third party intermediary

More tools… Crowds and Onion Routing – users in a large, diverse group are separated from their requests. Freenet – Anonymous content storage and retrieval. Infranet – Steganographic content delivery through cooperating third party server.

Problems with these tools Proxy-based intermediary schemes require the presence of a well-known proxy server, which can be blocked. Any scheme using SSL can be trivially blocked by killing connections with recognized SSL handshakes Encryption alone is not enough to prevent traffic analysis.

Infranet: overall goals Censorship Surveillance Plausible deniability Design goals: –Deniability for requestors (including statistical) –Responder covertness (identifying responders) –Communication robustness (resilience)

Infranet: threat model Passive: –Traffic Analysis –Logging Active – alteration of packets, sessions Impersonation – both of requester and responder

Infranet: system

System Two key entities: –Requester, which sits on the user’s end, and uses a tunnel to a public web server to request censored content. –Responder, which is integrated into a public web server. It fetches censored content, returns it to the requester over a covert channel, and treats all clients as if they were Infranet users.

The tunnel Three abstraction layers: –Message exchange (logical information passed between points) –Symbol construction (alphabet [URL list] specification) –Modulation (mapping between alphabet and message)

Tunnel setup The “Hello” of the protocol is implied by requesting an HTML document. Responder keeps track of user ID implicitly, generates unique URLs Requester sends shared secret with responders public key Responder creates unique modulation function.

Upstream data Requests for censored pages are imbedded in innocent looking HTTP requests Covert modulation achieved through range-mapping.

Downstream data The requester requests an HTML page with embedded images The unimportant bits in the image will be changed to carry encoded content (steganography) Shared secret key used as a pseudo- random number generator to decide which bits carry content

User control The system could be modified to allow the user some control over which URLs get sent: –Multiple URLs map to the same information, user selects which one –User can reject URLs, try to pass the information again

Active attack susceptibility The censor can modify traffic in both directions –It can flip bits in the return images –Insert/remove/reorder links on a page This can be detected and dropped by Infranet; could potentially be fixed with ECC.

More active attack The censor could send data from its own cache –“no-cache” directive will likely be ignored Infranet inherently circumvents this problem by serving unique URLs to each client – no cache hits.

Possible problems page 4 - "One way to distribute software is out-of-band via a CD-ROM or floppy disk. Users can share copies of the software and learn about Infranet responders directly from one another." –This seems to contradict plausible deniability

Possible problems Page 9 - "To join Infranet as a requester, a participant must discover the IP address and public key of a responder.” Can the IP address and public key be determined by a censor by passive analysis of user traffic?

Possible problems page 3 – "Hopefully, a significant number of people will run Infranet responders due to altruism or because they believe in free speech.“ page 11 – “Infranet’s success…depends on the pervasiveness of Infranet responders throughout the web.” –Requisite deployment issue

Possible problems Infranet counters black-list filtering –What about white-list filtering? In terms of plausible deniability, what about telltale software on the user’s machine?

Possible problems The paper states the only way to act as a valid requester, a censor must know the public key Does the censor need to act as a requester to identify responders (and subsequently, block them)? –eg, exploiting unique URLs per user

Anonymous Connections and Onion Routing Paul F. Syverson, David M. Goldschlag, and Michael G. Reed, Naval Research Labratory A simple paper A simple idea

Onion routing: basic idea Users send sensitive data to a proxy/onion router that is securely managed This machine generates a routing path, and encapsulates the data for each node in the path with next-hop information cryptographically. Each time a node is traversed, one of these “layers” of encryption is removed.

Onion: threat model All traffic is visible All traffic can be modified Onion routers may be compromised Compromised routers may cooperate

Acknowledged attacks Modifying or replaying onions will result in the end plaintext either not being delivered or not being readable. It does not result in sensitive information being disclosed or made obvious. But, this implies denial of service vulnerability.

Replay attacks To combat replay attacks, onion routers drop duplicate onions Each router keeps a hash of every onion it passes along Part of section 4: “To control storage requirements, onions are equipped with expiration times.” – absolute times are used in this scheme.

Possible problem Scalability: The number of asymmetric encryption applications is equal to twice the number of hops throughout the path for each packet. On their UltraSPARC, one such encryption took about one tenth of a second.

Questions Have systems such as Infranet beaten localized Internet censorship? Have they improved the situation by making censoring more difficult? Is Onion routing sufficient to protect the participants in arbitrary communication? Would Onion routing be sufficient to protect the source identity in a one-way conversation? The discussed schemes deal with anonymization and privacy as they relate to third parties; has any thing been done to protect privacy concerning second parties?